The Hawaiian Telcom Blog


Type of Content
Clear Filters

Security Articles

Cybersecurity Technology

Strong Passwords and Password Managers

Do you have a unique lock and key for your front door or do you put a pad lock bought at your nearest Walmart…


Russian-Ukrainian conflict has upped risk of cyberattacks

A lot is happening in the physical world in Eastern Europe, but many may not be aware of what is happening in…


Beware of phishing and scams with the holidays approaching

As we enter the holiday season during the second year of the COVID-19 pandemic, you can be sure scammers are…


Top 10 Takeaways from the Hawaiian Telcom University Cybersecurity Event

Cyber threats are happening more frequently, and Hawai‘i businesses are not immune. During a recent Hawaiian…


How to Land a Cybersecurity Job

There is no shortage of challenges in the cybersecurity space, but one of the biggest is the ability to…


Why Do Hackers Want Your Personal Information?

We often hear about data breaches, but what we don’t hear is what is done with the stolen personal…

Cyber Security

Cybersecurity Awareness Month: Do Your Part, #BeCyberSmart

This October marks the 18th anniversary of National Cybersecurity Awareness Month that aims to raise…

Cyber Security

Layered Security: What It Is & How It Protects Your Business

It's become increasingly common to hear about data breaches in our digitized world, and the cost of these…

Business Solutions

Protecting Your Business From Ransomware Attacks

Ransomware attacks have been all over the news lately, bringing the sense of uncertainty and insecurity to…


Are you one of the Walking Breached?

A new F-Secure study reveals how people who used breached services — The Walking Breached — are significantly…